3,477 research outputs found

    Implementation of a secure digital chaotic communication scheme on a DSP board

    Get PDF
    In this paper, a new a secure communication scheme using chaotic signal for transmitting binary digital signals is proposed and which is then implemented on a Digital Signal Processor (DSP) board. The method uses the idea of indirect coupled synchronization for generating the same keystream in the transmitter and receiver side. This chaotic keystream is applied to encrypt the message signal before being modulated with a chaotic carrier generated from the transmitter. Discrete chaotic maps, 3D Henon map and Lorenz system are used as transmitter/receiver and key generators respectively. The overall system is experimentally implemented in the TMS320C6713 DSK board using code composer and Simulink showing the successful message extraction thus proving the feasibility of the system in the DSP board

    Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption

    Full text link
    Optical chaos is a topic of current research characterized by high-dimensional nonlinearity which is attributed to the delay-induced dynamics, high bandwidth and easy modular implementation of optical feedback. In light of these facts, which adds enough confusion and diffusion properties for secure communications, we explore the synchronization phenomena in spatiotemporal semiconductor laser systems. The novel system is used in a two-phase colored image encryption process. The high-dimensional chaotic attractor generated by the system produces a completely randomized chaotic time series, which is ideal in the secure encoding of messages. The scheme thus illustrated is a two-phase encryption method, which provides sufficiently high confusion and diffusion properties of chaotic cryptosystem employed with unique data sets of processed chaotic sequences. In this novel method of cryptography, the chaotic phase masks are represented as images using the chaotic sequences as the elements of the image. The scheme drastically permutes the positions of the picture elements. The next additional layer of security further alters the statistical information of the original image to a great extent along the three-color planes. The intermediate results during encryption demonstrate the infeasibility for an unauthorized user to decipher the cipher image. Exhaustive statistical tests conducted validate that the scheme is robust against noise and resistant to common attacks due to the double shield of encryption and the infinite dimensionality of the relevant system of partial differential equations.Comment: 20 pages, 11 figures; Article in press, Optics Communications (2011

    Novel wireless modulation technique based on noise

    Get PDF
    In this paper, a new RF modulation technique is presented. Instead of using sinusoidal carriers as information bearer, pure noise is applied. This allows very simple radio architectures to be used. Spread-spectrum based technology is applied to modulate the noise bearer. Since the transmission bandwidth of the noise bearer can be made very wide, up to ultra-wideband regions, extremely large processing gains can be obtained. This will provide robustness in interference-prone environments. To avoid the local regeneration of the noise reference at the receiver, the Transmit-Reference (TR) concept is applied. In this concept, both the reference noise signal and the modulated noise signal are transmitted, together forming\ud the bearer. The reference and modulated signals are separated by applying a time offset. By applying different delay times for different channels (users) a new multiple access scheme results based on delay: Delay Division Multiple Access (DDMA). A theoretical analysis is given for the link performance of a single-user and a multi-user system. A testbed has been built to demonstrate the concept. The demonstrator operates in a 50 MHz bandwidth centered at 2.4 GHz. Processing gains ranging from 10¿30 dB have been tested. The testbed confirms the basic behavior as predicted by the theory

    Field-programmable gate array design of image encryption and decryption using Chua’s chaotic masking

    Get PDF
    This article presents a simple and efficient masking technique based on Chua chaotic system synchronization. It includes feeding the masked signal back to the master system and using it to drive the slave system for synchronization purposes. The proposed system is implemented in a field programmable gate array (FPGA) device using the Xilinx system generator tool. To achieve synchronization, the Pecora-Carroll identical cascading synchronization approach was used. The transmitted signal should be mixed or masked with a chaotic carrier and can be processed by the receiver without any distortion or loss. For different images, the security analysis is performed using the histogram, correlation coefficient, and entropy. In addition, FPGA hardware co-simulation based Xilinx Artix7 xc7a100t-1csg324 was used to check the reality of the encryption and decryption of the images
    corecore